THE THREAT LANDSCAPE FROM CYBERCRIME TO CYBER-WAR David Emm Global Research and Analysis Team.

Slides:



Advertisements
Similar presentations
Mobile Viruses and Worms (Project Group 6) Amit Kumar Jain Amogh Asgekar Jeevan Chalke Manoj Kumar Ramdas Rao.
Advertisements

Win the Cyberwar on Mobile Banking and Payments
Thank you to IT Training at Indiana University Computer Malware.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Mary Burger Owner ComputerDiva, LLC Vancouver, WA
PAGE 1 | Gradient colors RGBRGB Diagrams RGBRGB RGBRGB 166.
Security for Today’s Threat Landscape Kat Pelak 1.
1© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threat Sachin Deshmanya & Srinivas Matta.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
#AVeSPresents AVeS Cyber Security Confidence in your Digital Information 2014/09/25 Charl Ueckermann Managing Director AVeS Cyber Security Lex Informatica.
Internet as a Military-Free Zone: The Kaspersky Vision Eugene Kaspersky Chairman & CEO, Kaspersky Lab.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Advanced Persistent Threats CS461/ECE422 Spring 2012.
Internet safety By Lydia Snowden.
Submitted by: Abhashree Pradhan CA (1)
John Prisco President and CEO Triumfant, Inc. Our defenses are designed to defeat threats we have seen before. We have very little protection against.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
A sophisticated Malware Arpit Singh CPSC 420
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Study Results Advanced Persistent Threat Awareness.
Cyber crime & Security Prepared by : Rughani Zarana.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
The Changing World of Endpoint Protection
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.
Insider Threat Nation States Cyber Crime Hactivist Cyber Terrorist IndustrializedHackers Dynamic Cyber Security Landscape Cyber Actors ThreatsThreats.
Topic 5: Basic Security.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Android and IOS Permissions Why are they here and what do they want from me?
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
AP CSP: Cybercrime.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Botnets A collection of compromised machines
Ilija Jovičić Sophos Consultant.
A lustrum of malware network communication: Evolution & insights
Botnets A collection of compromised machines
Cybersecurity Awareness
Get instant internet security | | Wire IT Solutions
What devices use the internet?
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

THE THREAT LANDSCAPE FROM CYBERCRIME TO CYBER-WAR David Emm Global Research and Analysis Team

CONTENTS 2 What kind of malware? Who’s writing it and why? What do we do about it? 3 2 1

THE SCALE OF THE THREAT 1 NEW VIRUS EVERY HOUR NEW VIRUS EVERY MINUTE NEW VIRUS EVERY SECOND ,000 NEW SAMPLES EVERY DAY 2013

THE GROWING MALWARE THREAT

HOW MALWARE SPREADS 5 People Technology … and how people use it

VULNERABILITIES AND EXPLOITS 6

7

‘DRIVE-BY DOWNLOADS’ 8

SOCIAL NETWORKS 9

10

REMOVABLE MEDIA 11

DIGITAL CERTIFICATES 12

SOPHISTICATED THREATS 13 Code obfuscation Rootkits Hide changes made by malware Installed files Running processes Registry changes Advanced technologies £k1_ s”+gr!pl;7&

NEW TACTICS 14 All kinds of information Not just bank data Steal everything! Sophisticated Carefully selected targets Well-defined aims Targeted attacks

0.1 % 9.9 % 90 % THE NATURE OF THE THREAT Traditional cybercrime Targeted threats to organisations Cyber-weapons

POLITICAL, SOCIAL OR ECONOMIC PROTEST

THEFT OF SENSITIVE DATA “There’s no such thing as ‘secure’ any more. The most sophisticated adversaries are going to go unnoticed on our networks. We have to build our systems on the assumption that adversaries will get in. We have to, again, assume that all the components of our system are not safe, and make sure we’re adjusting accordingly.” Debora Plunkett, NSA Director Quoted in “NSA Switches to Assuming Security Has Always Been Compromised” “There’s no such thing as ‘secure’ any more. The most sophisticated adversaries are going to go unnoticed on our networks. We have to build our systems on the assumption that adversaries will get in. We have to, again, assume that all the components of our system are not safe, and make sure we’re adjusting accordingly.” Debora Plunkett, NSA Director Quoted in “NSA Switches to Assuming Security Has Always Been Compromised”

CYBER-WEAPONS “… cyber weapons are: a) effective; b) much cheaper than traditional weapons; c) difficult to detect; d) difficult to attribute to a particular attacker …; e) difficult to protect against …; f) can be replicated at no extra cost. What’s more, the seemingly harmless nature of these weapons means their owners have few qualms about unleashing them, with little thought for the consequences. Eugene Kaspersky June “… cyber weapons are: a) effective; b) much cheaper than traditional weapons; c) difficult to detect; d) difficult to attribute to a particular attacker …; e) difficult to protect against …; f) can be replicated at no extra cost. What’s more, the seemingly harmless nature of these weapons means their owners have few qualms about unleashing them, with little thought for the consequences. Eugene Kaspersky June

CYBER-WEAPONS: NUMBER OF VICTIMS OVER 100K OVER 300K 2,500 10K K StuxnetGaussFlameDuquminiFlame Known number of incidentsAdditional number of incidents (approximate) 300K 100K 10K 1K Source: Kaspersky Lab

TARGETED ATTACKS 20 Google RSA Lockheed Martin Sony Comodo DigiNotar Some of the victims: Saudi Aramco LinkedIn Adobe Syrian Ministry of Foreign Affairs The New York Times Tibetan activitists

21

MOBILE MALWARE 22 10,000,509 unique installation packs

WHY TARGET MOBILE DEVICES? Mobile devices contain lots of interesting data: SMS messages Business Business contactsPersonal photosGPS co-ordinatesBanking credentialsInstalled appsCalendar The evolving threat landscape23

PLATFORMS 24

WHAT SORT OF MALWARE? 25

THE GEOGRAPHY OF MOBILE MALWARE 26

MOBILE DEVICES AND TARGETED ATTACKS 27

WHAT DO WE DO ABOUT IT? 28

WHAT DO WE DO ABOUT IT? 29

WHAT DO WE DO ABOUT IT? 30

QUESTIONS David Emm Global Research and Analysis Team